SlideShare a Scribd company logo
1 of 3
Download to read offline
Shruti jawanjal et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 2( Part 4), February 2015, pp.47-49
www.ijera.com 47 | P a g e
Single System Image Server Cluster
Shruti jawanjal*
*(Department of Computer Science, sant gadge baba university, Maharashtra)
ABSTRACT
The paper reports an implementation of Single System Image Server Cluster (SSISC). The Servers have been
configured with same MAC and IP addresses and are connected through a two layer switch. Implementation has
been done by modifying iptables and recompiling the linux kernel. This implementation has been tested for
performance using WebStone. WebStone is a highly- configurable client-server benchmark for
HTTP servers. This implementation removes a possibility of single point failure of web cluster. The
implementation automatically detects newly added and failed server and hence reliable. The test indicates that
requests are distributed to servers in the cluster, depends on the policy of distribution.
Keywords – MAC, IP, iptables, recompiling, Webstone.
I. INTRODUCTION
A common technique used to build a high
capacity web server is to use a cluster of server
machines with a centralized dispatcher. The
dispatcher receives all incoming requests and
distributes them to one of the servers
II. Materials & Methods
2.1 Methods Used
All machines in a cluster are having with the
same IP and MAC address, to avoid the need for
router configuration in ONE-IP. This design is called
the “Clone Cluster” [5] in this method all machines
in the cluster are perfect images. All machines are
attached to a shared-medium Ethernet LAN using
simple 2 layer Enterasys VH-2402S2 switch [2] so
that all packets are seen by all machines. The Linux
kernel of each machine is modified and recompiled.
This modification is done to provide machines with
same MAC address with switch. The Clone Cluster
configuration (Fig 1) is the same as ONE-IP, but no
changes in the router are required. This method
automatically detects newly added server. Failure of
any server does not affect the system, so definitely
the reliability is improved. Connection is established
randomly with any machine in clone cluster.
Fig 1 : Configuration for Clone Cluster
2.2 Server Configuration with two layer switch
The cluster machines are attached to a two layer
switch [4]. As two-layer switches are needed of
having different source MAC address on all of that
switch port. To defend this conflict the source MAC
address for the packets which are outgoing and
present in Ethernet header are changed to the
different MAC address then the kernel for each
machine just because of this its recompilation and
installation is done. This thing avoid the switch by
getting the image of MAC address because if the
MAC address is duplicated then all the all the
packets will not delivered properly on switch port.
The packets which are incoming present in Ethernet
header they have same MAC address which is as of
destination address and the packets which are
outgoing they also present in the Ethernet header but
they have MAC address of virtual machine which is
as of source address. The switch changes its MAC
vs. port table by keeping source address in Ethernet
header. Thus switch not having clustered’s copied
MAC address. The client requires cluster’s copied
MAC address for communication. The client form
an ARP [6][5] request to get cluster’s copied MAC
address. The structure of ARP packet is shown in
figure 2. The ARP request packet is simple. ARP has
source address which is client MAC address and
destination address as broadcast address which is in
the Ethernet header. It also has source address as
client MAC address and IP address and in ARP
header it has clusters IP header and empty field for
MAC address.The ARP reply packet from cluster
needs updating to avoid switch from getting cluster’s
actual MAC address. The ARP header contains
cluster’s IP and copied MAC address as source
address & client’s MAC and IP address as
destination address. The Ethernet header in ARP
reply packet contains clients MAC address as
destination address and cluster machine’s virtual
MAC address as source address. Thus the difference
RESEARCH ARTICLE OPEN ACCESS
Shruti jawanjal et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 2( Part 4), February 2015, pp.47-49
www.ijera.com 48 | P a g e
in source MAC address in Ethernet and ARP header
prevents the switch from getting cluster’s copied
MAC address contained in ARP header and at the
same time provide cluster’s copied MAC address to
the client that is contained in ARP header. The
switch gets the virtual MAC address of each
machine.
Fig 2: Format of ARP request or reply packet
III. Implementation
3.1 Implementing duplicate addresses
All standard Ethernet adapters contain a
different burned-in MAC address. This address can
be over-ridden by a locally administered address.
Linux shell commands [6] can be used to assign a
locally administered address.
The Ethernet cards on different machines are
having with the same MAC address and attach the
same secondary IP address to these interfaces.
Before a host attaches a new IP address to its
Ethernet card, it checks that no other host on the
same LAN is using that IP address. If same IP
address is found, both machines are informed and
warnings are issued. When there are two machines
with the same primary IP address, ARP detects this
inconsistency and issues warning. A ARP packet is
sent during initialization. Gratuitous ARP is an ARP
packet with destination as broadcast address and the
source address as the IP address of the machine. Its
basic purpose is to announce the IP address of the
new machine on the LAN. If there is another
machine with the same IP already existing on the
LAN then it comes to know of this machine using
the same IP and issue a warning. To avoid detection
of the duplicate IP address in the Clone Cluster, the
ifup file in /sbin directory is modified. This
modification prevents any action on detection of
duplicate IP.
3.2 TCP connection
The transport layer provides a flow of data
between two hosts, for the application layer. In
TCP/IP protocol suite there are two vastly different
transport protocols; TCP (Transmission Control
Protocol) and UDP (User Datagram Protocol). TCP
is a connection-oriented protocol. The three-way
TCP handshake (fig 5) completes the connection
establishment. The requesting end (normally called
the client) sends a SYN segment.
Fig3: TCP three-way handshake
IV. Results and Discussion
4.1 Evaluation Experiments
Two experiments were done to know the
performance of the Clone Cluster using three load
balancing policies.
Baseline experiment: This experiment baselines
the performance of a single server machine. The
Web Stone benchmark was used. Response time and
server throughput were measured.
Two machine cluster experiment: This
experiment measures the improvement (over a single
machine) in response time and server throughput for
a two machine Clone Cluster. The experimental set-
up was the same as for the baseline experiment.
4.2 Evaluation Results
Figure 4 show the results for the one (baseline)
and figure 5 & 6 for the two machine cluster
experiments. The measurements are taken from Web
Stone run log files. Figure 4 shows that the server
throughput and average response time for one
machine plateaus at about 150 clients. Further
increases in load increases average response time
and server throughput. This shows that the
satisfaction point for the cluster has been reached.
Figure 8 shows the server throughput and average
response time for two machine cluster by using the
policy to distribute the client requests by load.
Similarly, figure 6 shows the server throughput and
average response time for two machine cluster for
random distribution of client requests. The two
machine cluster removes the saturation point for one
machine cluster.
Shruti jawanjal et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 2( Part 4), February 2015, pp.47-49
www.ijera.com 49 | P a g e
Fig4: performance analysis baseline experiment
Fig5: performance analysis of two machine
experiment (by load policy)
Fig6: Performance analysis of two machine
experiment (by random policy)
Fig6 shows the average response time vs.
number of clients, graph for one and two machine
image by distributing the client requests randomly
and by load. It shows the satisfaction point for one
machine cluster at 150 clients. This satisfaction
point is passed in two machine cluster. The by Load
and by Random policies show same in behavior.
Figure 8 shows the server throughput time vs
number of client’s graph. The initial performance of
one machine cluster is better than two machine
cluster unto its saturation point. The two machine
cluster shows consistent performance.
Fig 7: Average Response Time Vs Number of
Clients
Fig8 : Server Throughput Vs Number of Clients
V. Acknowledgements
I would like to acknowledge sant gadge baba
university Maharashtar, India to provide the facility.
References
[1]. T. Brisco, DNS Support for Load
Balancing, RFC 1794, April 1995.
[2]. K. Egevang and P. Francis, ``The IP
Network Address Translator (NAT)'', RFC
1631, May 1994.
[3]. A. Bestavros, M. Crovella, J. Liu and D.
Martin, Distributed Packet Rewriting and
its Application to Scalable Server
Architectures, Proceedings of the Sixth
International Conference on Network
Protocols, 1998.
[4]. O. Damani, P. Emerald Chung, Y. Huang,
C. Kintala, and Y. Wang, “ONE-IP:
Techniques for Hosting a Service on a
Cluster of Machines”, Journal of Computer
Networks and ISDN Systems, Vol. 29, No.
8-13, pp. 1019-1027, 1997.
[5]. Sujit Vaidya and Kenneth J. Christensen,
“A Single System Image Server Cluster
using Duplicated MAC and IP Addresses”,
Proceedings of the 26th Annual IEEE
Conference on Local Computer Networks,
2001.
[6]. W. Stevens, “TCP/IP Illustrated Vol 1”,
Addison Wesley Longman, 1998.

More Related Content

What's hot

Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layerRonoh Kennedy
 
Mikrotik link redundancy solution
Mikrotik link redundancy solution Mikrotik link redundancy solution
Mikrotik link redundancy solution S M Tipu
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Tutun Juhana
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet CountAmazon Web Services
 
Improved secure address resolution protocol
Improved secure address resolution protocolImproved secure address resolution protocol
Improved secure address resolution protocolcsandit
 
Network layer
Network layerNetwork layer
Network layersbkbca
 
Chapter 25. implementing i pv6 routing
Chapter 25. implementing i pv6 routingChapter 25. implementing i pv6 routing
Chapter 25. implementing i pv6 routingVishnu Vardhan
 
Chapter 5 : Link Layer
Chapter 5 : Link LayerChapter 5 : Link Layer
Chapter 5 : Link LayerAmin Omi
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Tutun Juhana
 
Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...varun priyan
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 

What's hot (20)

Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Mikrotik link redundancy solution
Mikrotik link redundancy solution Mikrotik link redundancy solution
Mikrotik link redundancy solution
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
Improved secure address resolution protocol
Improved secure address resolution protocolImproved secure address resolution protocol
Improved secure address resolution protocol
 
Network layer
Network layerNetwork layer
Network layer
 
Chapter 25. implementing i pv6 routing
Chapter 25. implementing i pv6 routingChapter 25. implementing i pv6 routing
Chapter 25. implementing i pv6 routing
 
Chapter 5 : Link Layer
Chapter 5 : Link LayerChapter 5 : Link Layer
Chapter 5 : Link Layer
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Mod4
Mod4Mod4
Mod4
 
Icmp
IcmpIcmp
Icmp
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...Filterbased addressing protocol for effective node auto configuration in ad h...
Filterbased addressing protocol for effective node auto configuration in ad h...
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Dropped image 170
Dropped image 170Dropped image 170
Dropped image 170
 
Network layer
Network layerNetwork layer
Network layer
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 

Viewers also liked

The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...IJERA Editor
 
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”IJERA Editor
 
Breve presentazione Wikimania Esino Lario 2016 in italiano
Breve presentazione Wikimania Esino Lario 2016 in italianoBreve presentazione Wikimania Esino Lario 2016 in italiano
Breve presentazione Wikimania Esino Lario 2016 in italianoIolanda Pensa
 
Praktika 6 darina tšerdakova
Praktika 6 darina tšerdakovaPraktika 6 darina tšerdakova
Praktika 6 darina tšerdakovaDarina Cherdakova
 
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverProvable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverIJERA Editor
 
Deshiroj Te Pendohem Por
Deshiroj Te Pendohem PorDeshiroj Te Pendohem Por
Deshiroj Te Pendohem Porguestef339
 
Pert 11&12 p ph psl. 25
Pert 11&12 p ph psl. 25Pert 11&12 p ph psl. 25
Pert 11&12 p ph psl. 25anggradini
 
Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...
Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...
Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...IJERA Editor
 
Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016 Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016 Raedelijn
 
Reliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point MethodReliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point MethodIJERA Editor
 
Fabrication and performance evaluation of oil –fired crucible furnace using l...
Fabrication and performance evaluation of oil –fired crucible furnace using l...Fabrication and performance evaluation of oil –fired crucible furnace using l...
Fabrication and performance evaluation of oil –fired crucible furnace using l...IJERA Editor
 
Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...
Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...
Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...IJERA Editor
 

Viewers also liked (19)

The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
 
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
 
Breve presentazione Wikimania Esino Lario 2016 in italiano
Breve presentazione Wikimania Esino Lario 2016 in italianoBreve presentazione Wikimania Esino Lario 2016 in italiano
Breve presentazione Wikimania Esino Lario 2016 in italiano
 
Praktika 6 darina tšerdakova
Praktika 6 darina tšerdakovaPraktika 6 darina tšerdakova
Praktika 6 darina tšerdakova
 
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverProvable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted server
 
Deshiroj Te Pendohem Por
Deshiroj Te Pendohem PorDeshiroj Te Pendohem Por
Deshiroj Te Pendohem Por
 
Pert 11&12 p ph psl. 25
Pert 11&12 p ph psl. 25Pert 11&12 p ph psl. 25
Pert 11&12 p ph psl. 25
 
Presentatie Easy-Rent
Presentatie Easy-RentPresentatie Easy-Rent
Presentatie Easy-Rent
 
Hemp The food
Hemp The foodHemp The food
Hemp The food
 
Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...
Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...
Condition Monitoring and Vibrational Analysis of Proposed Shaft through Exper...
 
img-916082552
img-916082552img-916082552
img-916082552
 
Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016 Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016
 
Reliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point MethodReliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point Method
 
Fabrication and performance evaluation of oil –fired crucible furnace using l...
Fabrication and performance evaluation of oil –fired crucible furnace using l...Fabrication and performance evaluation of oil –fired crucible furnace using l...
Fabrication and performance evaluation of oil –fired crucible furnace using l...
 
Comercio
ComercioComercio
Comercio
 
Planning Images
Planning ImagesPlanning Images
Planning Images
 
A53020104
A53020104A53020104
A53020104
 
Pres ru-telesmotr-tv7
Pres ru-telesmotr-tv7Pres ru-telesmotr-tv7
Pres ru-telesmotr-tv7
 
Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...
Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...
Effect of Composition of Sand Mold on Mechanical Properties and Density of Al...
 

Similar to Single System Image Server Cluster

Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Jaipal Dhobale
 
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration TechniquesPerformance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration TechniquesIOSR Journals
 
Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...eSAT Journals
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorialpinck2329
 
Performance comparison of row per slave and rows set
Performance comparison of row per slave and rows setPerformance comparison of row per slave and rows set
Performance comparison of row per slave and rows seteSAT Publishing House
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...CSCJournals
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Jaipal Dhobale
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed systemGd Goenka University
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.comWilliamsTaylorzo
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comStephenson39
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comsholingarjosh104
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.comHarrisGeorgz
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
Review on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingReview on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingeSAT Publishing House
 

Similar to Single System Image Server Cluster (20)

Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...
 
A distributed virtual architecture for data centers
A distributed virtual architecture for data centersA distributed virtual architecture for data centers
A distributed virtual architecture for data centers
 
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration TechniquesPerformance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
 
N017147679
N017147679N017147679
N017147679
 
Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
Performance comparison of row per slave and rows set
Performance comparison of row per slave and rows setPerformance comparison of row per slave and rows set
Performance comparison of row per slave and rows set
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
G04844450
G04844450G04844450
G04844450
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.com
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
H04845157
H04845157H04845157
H04845157
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.com
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.com
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.com
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Review on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingReview on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancing
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Single System Image Server Cluster

  • 1. Shruti jawanjal et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 2( Part 4), February 2015, pp.47-49 www.ijera.com 47 | P a g e Single System Image Server Cluster Shruti jawanjal* *(Department of Computer Science, sant gadge baba university, Maharashtra) ABSTRACT The paper reports an implementation of Single System Image Server Cluster (SSISC). The Servers have been configured with same MAC and IP addresses and are connected through a two layer switch. Implementation has been done by modifying iptables and recompiling the linux kernel. This implementation has been tested for performance using WebStone. WebStone is a highly- configurable client-server benchmark for HTTP servers. This implementation removes a possibility of single point failure of web cluster. The implementation automatically detects newly added and failed server and hence reliable. The test indicates that requests are distributed to servers in the cluster, depends on the policy of distribution. Keywords – MAC, IP, iptables, recompiling, Webstone. I. INTRODUCTION A common technique used to build a high capacity web server is to use a cluster of server machines with a centralized dispatcher. The dispatcher receives all incoming requests and distributes them to one of the servers II. Materials & Methods 2.1 Methods Used All machines in a cluster are having with the same IP and MAC address, to avoid the need for router configuration in ONE-IP. This design is called the “Clone Cluster” [5] in this method all machines in the cluster are perfect images. All machines are attached to a shared-medium Ethernet LAN using simple 2 layer Enterasys VH-2402S2 switch [2] so that all packets are seen by all machines. The Linux kernel of each machine is modified and recompiled. This modification is done to provide machines with same MAC address with switch. The Clone Cluster configuration (Fig 1) is the same as ONE-IP, but no changes in the router are required. This method automatically detects newly added server. Failure of any server does not affect the system, so definitely the reliability is improved. Connection is established randomly with any machine in clone cluster. Fig 1 : Configuration for Clone Cluster 2.2 Server Configuration with two layer switch The cluster machines are attached to a two layer switch [4]. As two-layer switches are needed of having different source MAC address on all of that switch port. To defend this conflict the source MAC address for the packets which are outgoing and present in Ethernet header are changed to the different MAC address then the kernel for each machine just because of this its recompilation and installation is done. This thing avoid the switch by getting the image of MAC address because if the MAC address is duplicated then all the all the packets will not delivered properly on switch port. The packets which are incoming present in Ethernet header they have same MAC address which is as of destination address and the packets which are outgoing they also present in the Ethernet header but they have MAC address of virtual machine which is as of source address. The switch changes its MAC vs. port table by keeping source address in Ethernet header. Thus switch not having clustered’s copied MAC address. The client requires cluster’s copied MAC address for communication. The client form an ARP [6][5] request to get cluster’s copied MAC address. The structure of ARP packet is shown in figure 2. The ARP request packet is simple. ARP has source address which is client MAC address and destination address as broadcast address which is in the Ethernet header. It also has source address as client MAC address and IP address and in ARP header it has clusters IP header and empty field for MAC address.The ARP reply packet from cluster needs updating to avoid switch from getting cluster’s actual MAC address. The ARP header contains cluster’s IP and copied MAC address as source address & client’s MAC and IP address as destination address. The Ethernet header in ARP reply packet contains clients MAC address as destination address and cluster machine’s virtual MAC address as source address. Thus the difference RESEARCH ARTICLE OPEN ACCESS
  • 2. Shruti jawanjal et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 2( Part 4), February 2015, pp.47-49 www.ijera.com 48 | P a g e in source MAC address in Ethernet and ARP header prevents the switch from getting cluster’s copied MAC address contained in ARP header and at the same time provide cluster’s copied MAC address to the client that is contained in ARP header. The switch gets the virtual MAC address of each machine. Fig 2: Format of ARP request or reply packet III. Implementation 3.1 Implementing duplicate addresses All standard Ethernet adapters contain a different burned-in MAC address. This address can be over-ridden by a locally administered address. Linux shell commands [6] can be used to assign a locally administered address. The Ethernet cards on different machines are having with the same MAC address and attach the same secondary IP address to these interfaces. Before a host attaches a new IP address to its Ethernet card, it checks that no other host on the same LAN is using that IP address. If same IP address is found, both machines are informed and warnings are issued. When there are two machines with the same primary IP address, ARP detects this inconsistency and issues warning. A ARP packet is sent during initialization. Gratuitous ARP is an ARP packet with destination as broadcast address and the source address as the IP address of the machine. Its basic purpose is to announce the IP address of the new machine on the LAN. If there is another machine with the same IP already existing on the LAN then it comes to know of this machine using the same IP and issue a warning. To avoid detection of the duplicate IP address in the Clone Cluster, the ifup file in /sbin directory is modified. This modification prevents any action on detection of duplicate IP. 3.2 TCP connection The transport layer provides a flow of data between two hosts, for the application layer. In TCP/IP protocol suite there are two vastly different transport protocols; TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is a connection-oriented protocol. The three-way TCP handshake (fig 5) completes the connection establishment. The requesting end (normally called the client) sends a SYN segment. Fig3: TCP three-way handshake IV. Results and Discussion 4.1 Evaluation Experiments Two experiments were done to know the performance of the Clone Cluster using three load balancing policies. Baseline experiment: This experiment baselines the performance of a single server machine. The Web Stone benchmark was used. Response time and server throughput were measured. Two machine cluster experiment: This experiment measures the improvement (over a single machine) in response time and server throughput for a two machine Clone Cluster. The experimental set- up was the same as for the baseline experiment. 4.2 Evaluation Results Figure 4 show the results for the one (baseline) and figure 5 & 6 for the two machine cluster experiments. The measurements are taken from Web Stone run log files. Figure 4 shows that the server throughput and average response time for one machine plateaus at about 150 clients. Further increases in load increases average response time and server throughput. This shows that the satisfaction point for the cluster has been reached. Figure 8 shows the server throughput and average response time for two machine cluster by using the policy to distribute the client requests by load. Similarly, figure 6 shows the server throughput and average response time for two machine cluster for random distribution of client requests. The two machine cluster removes the saturation point for one machine cluster.
  • 3. Shruti jawanjal et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 2( Part 4), February 2015, pp.47-49 www.ijera.com 49 | P a g e Fig4: performance analysis baseline experiment Fig5: performance analysis of two machine experiment (by load policy) Fig6: Performance analysis of two machine experiment (by random policy) Fig6 shows the average response time vs. number of clients, graph for one and two machine image by distributing the client requests randomly and by load. It shows the satisfaction point for one machine cluster at 150 clients. This satisfaction point is passed in two machine cluster. The by Load and by Random policies show same in behavior. Figure 8 shows the server throughput time vs number of client’s graph. The initial performance of one machine cluster is better than two machine cluster unto its saturation point. The two machine cluster shows consistent performance. Fig 7: Average Response Time Vs Number of Clients Fig8 : Server Throughput Vs Number of Clients V. Acknowledgements I would like to acknowledge sant gadge baba university Maharashtar, India to provide the facility. References [1]. T. Brisco, DNS Support for Load Balancing, RFC 1794, April 1995. [2]. K. Egevang and P. Francis, ``The IP Network Address Translator (NAT)'', RFC 1631, May 1994. [3]. A. Bestavros, M. Crovella, J. Liu and D. Martin, Distributed Packet Rewriting and its Application to Scalable Server Architectures, Proceedings of the Sixth International Conference on Network Protocols, 1998. [4]. O. Damani, P. Emerald Chung, Y. Huang, C. Kintala, and Y. Wang, “ONE-IP: Techniques for Hosting a Service on a Cluster of Machines”, Journal of Computer Networks and ISDN Systems, Vol. 29, No. 8-13, pp. 1019-1027, 1997. [5]. Sujit Vaidya and Kenneth J. Christensen, “A Single System Image Server Cluster using Duplicated MAC and IP Addresses”, Proceedings of the 26th Annual IEEE Conference on Local Computer Networks, 2001. [6]. W. Stevens, “TCP/IP Illustrated Vol 1”, Addison Wesley Longman, 1998.